I have the following setup. Please tell me if I have some security issues here.
A linux box with two ethernet interfaces to work as a masquerading router. One of them (eth0) is connected to a dsl-modem, the other is a wlan card (eth1). All client systems get this box a default gateway via dhcp.
My goal is to drop everything coming from the wlan by default. I do this with:
# iptables -t nat -P PREROUTING DROP
I want the all www-requests of the client systems to be redirected to the local Apache on the box. I do this with:
# iptables -t nat -A PREROUTING -p tcp --dport 80 -i eth1 - REDIRECT
As I need DNS for these www-requests I have to let DNS be accepted:
# iptables -t nat -A PREROUTING -p udp --dport 53 -i eth1 -j ACCEPT
Then, in the POSTROUTING chain I need all the packets that made it here to be masqueraded:
# iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
If I want to allow a specific wlan client to get outside connections I use:
# iptables -t nat -I PREROUTING -m mac --mac-source XX:XX:XX:XX:XX:XX -i the1 -j ACCEPT
to let him through.
Beside of MAC-spoofing, is this setup safe? Can someone get though the PREROUTING chain, without being "MAC-inserted".
What can I do to block incoming connection attempts? I only want to allow ssh from outside (internet) to the box.
Any help would be appreciated!
THX, Andreas Westendörpf